Answered step by step
Verified Expert Solution
Question
1 Approved Answer
Queston 1 : Data network and SecurityQueston 1 : Data network and Security QUESTION 1 [40 MARKS] (a) Universiti Malaysia Pahang (UMP) has been using
Queston 1 : Data network and SecurityQueston 1 : Data network and Security
QUESTION 1 [40 MARKS] (a) Universiti Malaysia Pahang (UMP) has been using their own website with several efficient internal systems to provide better education for students. Some of the services that has been provided by UMP to their students and staff are internet connection, email, Kalam portal, e-Community portal which can be accessed inside and outside the university premises, and wi-fi connection. Based on the given information, identify TWO (2) possible vectors that can be used to attack the UMP network. 14 Marks (b) The key is 41837526. The default filling letters of the table are ......X Y Z. Using the given details, encrypt the message, your time is limited, finish it quickly without consulting book," by using double transposition cipher method. Explain all the steps involved [16 Marks (C) Darius is a crime investigator in CRI secret agency. Now he is appointed to investigate a murder case in Mount Kinabalu. So he is staying in the hotel and uses the hotel Wi- Fi services to communicate with the agency. He has gathered some important evidences regarding the case. Suddenly, he sensed that he has been spied by someone (the spy might belong to murderer group). Now, Darius want to convey this spying matter to his agency. Darius thought, using phone calls might be insecure, so he wanted to use email for communication. Since he is communicating over unsecured channel, he has decided to encrypt his message using some key. Darius and the Agency will share the key in such a way that the spy cannot obtain the key. So, they agreed on using two publicly known numbers. But, now they have a confusion to choose the correct algorithm to proceed. Now, please help them to solve the situation. [16 Marks) (C) Darius is a crime investigator in CRI secret agency. Now he is appointed to investigate a murder case in Mount Kinabalu. So he is staying in the hotel and uses the hotel Wi- Fi services to communicate with the agency. He has gathered some important evidences regarding the case. Suddenly, he sensed that he has been spied by someone (the spy might belong to murderer group). Now, Darius want to convey this spying matter to his agency. Darius thought, using phone calls might be insecure, so he wanted to use email for communication. Since he is communicating over unsecured channel, he has decided to encrypt his message using some key. Darius and the Agency will share the key in such a way that the spy cannot obtain the key. So, they agreed on using two publicly known numbers. But, now they have a confusion to choose the correct algorithm to proceed. Now, please help them to solve the situation. i. Based on the given information, suggest a suitable algorithm for them to proceed and justify your answer. [4 Marks ii. Darius has used some asymmetric encryption technique to encrypt his message and the cipher message that has reached the agency is, C=8. Identify the asymmetric encryption used by Darius. Derive the original message if he has used the public key, e=13, and n=77. All the mathematical calculations involved in each step should be shown. [16 MarksStep by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started